Closed Bug 1376758 Opened 8 years ago Closed 8 years ago

Clickjacking in Core Mozila Product: Shield: qsurvey.mozilla.com

Categories

(Websites :: Other, defect)

defect
Not set
normal

Tracking

(Not tracked)

RESOLVED DUPLICATE of bug 1329005

People

(Reporter: niputiwari, Assigned: tdowner)

References

()

Details

(Keywords: reporter-external, sec-moderate, wsec-crossdomain, Whiteboard: [reporter-external] [web-bounty-form] [verif?])

Attachments

(1 file)

580.79 KB, application/pdf
Details
Attached file Attachment as POC
Vulnerability Category comes under CWE 693 https://cwe.mitre.org/data/definitions/693.html Nice read: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options POC Steps 1. Open https://qsurvey.mozilla.com/survey-software-features/salesforce/ Step 2. Craft a clickjack page <html> <!-- Clickjack PoC - Clickjack --> <body > <iframe src="https://qsurvey.mozilla.com/survey-software-features/salesforce/" width=75% height =75%/> </body> </html> Step 3: Open a specially crafted page and observe that page is loaded in iframe. Step 4: Within iframe loaded page click services-> programming services. Observe that user is directed to programming services page. i.e; clickjack attack is happening.
Flags: sec-bounty?
Yeah, distinct lack of an X-Frame-Options header :/
Status: UNCONFIRMED → NEW
Ever confirmed: true
Assignee: nobody → tdowner
Flags: needinfo?(tdowner)
Flags: needinfo?(glind)
Surveygizmo is aware and has created a card to add support for x-frame-options, however they are treating it as a new feature and not a security issue. Hopefully they will add support soon.
Status: NEW → RESOLVED
Closed: 8 years ago
Flags: needinfo?(tdowner)
Resolution: --- → DUPLICATE
Flags: needinfo?(glind)
Thanks Tyler
Duplicate issue so minusing for bounty.
Flags: sec-bounty? → sec-bounty-
Group: websites-security
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: